Read Ebook: The Hacker Crackdown: Law and Disorder on the Electronic Frontier by Sterling Bruce
Font size:
Background color:
Text color:
Add to tbrJar First Page Next Page
Ebook has 1506 lines and 107234 words, and 31 pages
Preface to the Electronic Release of The Hacker Crackdown
Chronology of the Hacker Crackdown
Introduction
Part 1: CRASHING THE SYSTEM A Brief History of Telephony Bell's Golden Vaporware Universal Service Wild Boys and Wire Women The Electronic Communities The Ungentle Giant The Breakup In Defense of the System The Crash Post-Mortem Landslides in Cyberspace
Part 2: THE DIGITAL UNDERGROUND Steal This Phone Phreaking and Hacking The View From Under the Floorboards Boards: Core of the Underground Phile Phun The Rake's Progress Strongholds of the Elite Sting Boards Hot Potatoes War on the Legion Terminus Phile 9-1-1 War Games Real Cyberpunk
Part 3: LAW AND ORDER Crooked Boards The World's Biggest Hacker Bust Teach Them a Lesson The U.S. Secret Service The Secret Service Battles the Boodlers A Walk Downtown FCIC: The Cutting-Edge Mess Cyberspace Rangers FLETC: Training the Hacker-Trackers
Electronic Afterword to The Hacker Crackdown, Halloween 1993
THE HACKER CRACKDOWN
Law and Disorder on the Electronic Frontier
by Bruce Sterling
Preface to the Electronic Release of The Hacker Crackdown
January 1, 1994--Austin, Texas
Hi, I'm Bruce Sterling, the author of this electronic book.
Out in the traditional world of print, The Hacker Crackdown is ISBN 0-553-08058-X, and is formally catalogued by the Library of Congress as "1. Computer crimes--United States. 2. Telephone--United States--Corrupt practices. 3. Programming --United States--Corrupt practices."
`Corrupt practices,' I always get a kick out of that description. Librarians are very ingenious people.
"No part of this book may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage and retrieval system, without permission in writing from the publisher. For information address: Bantam Books."
This is a pretty good disclaimer, as such disclaimers go. I collect intellectual-property disclaimers, and I've seen dozens of them, and this one is at least pretty straightforward. In this narrow and particular case, however, it isn't quite accurate. Bantam Books puts that disclaimer on every book they publish, but Bantam Books does not, in fact, own the electronic rights to this book. I do, because of certain extensive contract maneuverings my agent and I went through before this book was written. I want to give those electronic publishing rights away through certain not-for-profit channels, and I've convinced Bantam that this is a good idea.
Since Bantam has seen fit to peacably agree to this scheme of mine, Bantam Books is not going to fuss about this. Provided you don't try to sell the book, they are not going to bother you for what you do with the electronic copy of this book. If you want to check this out personally, you can ask them; they're at 1540 Broadway NY NY 10036. However, if you were so foolish as to print this book and start retailing it for money in violation of my copyright and the commercial interests of Bantam Books, then Bantam, a part of the gigantic Bertelsmann multinational publishing combine, would roust some of their heavy-duty attorneys out of hibernation and crush you like a bug. This is only to be expected. I didn't write this book so that you could make money out of it. If anybody is gonna make money out of this book, it's gonna be me and my publisher.
My publisher deserves to make money out of this book. Not only did the folks at Bantam Books commission me to write the book, and pay me a hefty sum to do so, but they bravely printed, in text, an electronic document the reproduction of which was once alleged to be a federal felony. Bantam Books and their numerous attorneys were very brave and forthright about this book. Furthermore, my former editor at Bantam Books, Betsy Mitchell, genuinely cared about this project, and worked hard on it, and had a lot of wise things to say about the manuscript. Betsy deserves genuine credit for this book, credit that editors too rarely get.
Well-meaning, public-spirited civil libertarians don't have much money, either. And it seems almost criminal to snatch cash out of the hands of America's direly underpaid electronic law enforcement community.
If you're a computer cop, a hacker, or an electronic civil liberties activist, you are the target audience for this book. I wrote this book because I wanted to help you, and help other people understand you and your unique, uhm, problems. I wrote this book to aid your activities, and to contribute to the public discussion of important political issues. In giving the text away in this fashion, I am directly contributing to the book's ultimate aim: to help civilize cyberspace.
Information WANTS to be free. And the information inside this book longs for freedom with a peculiar intensity. I genuinely believe that the natural habitat of this book is inside an electronic network. That may not be the easiest direct method to generate revenue for the book's author, but that doesn't matter; this is where this book belongs by its nature. I've written other books--plenty of other books-- and I'll write more and I am writing more, but this one is special. I am making The Hacker Crackdown available electronically as widely as I can conveniently manage, and if you like the book, and think it is useful, then I urge you to do the same with it.
You can copy this electronic book. Copy the heck out of it, be my guest, and give those copies to anybody who wants them. The nascent world of cyberspace is full of sysadmins, teachers, trainers, cybrarians, netgurus, and various species of cybernetic activist. If you're one of those people, I know about you, and I know the hassle you go through to try to help people learn about the electronic frontier. I hope that possessing this book in electronic form will lessen your troubles. Granted, this treatment of our electronic social spectrum is not the ultimate in academic rigor. And politically, it has something to offend and trouble almost everyone. But hey, I'm told it's readable, and at least the price is right.
You can upload the book onto bulletin board systems, or Internet nodes, or electronic discussion groups. Go right ahead and do that, I am giving you express permission right now. Enjoy yourself.
You can put the book on disks and give the disks away, as long as you don't take any money for it.
This electronic book is now literary freeware. It now belongs to the emergent realm of alternative information economics. You have no right to make this electronic book part of the conventional flow of commerce. Let it be part of the flow of knowledge: there's a difference. I've divided the book into four sections, so that it is less ungainly for upload and download; if there's a section of particular relevance to you and your colleagues, feel free to reproduce that one and skip the rest.
Just make more when you need them, and give them to whoever might want them.
Now have fun.
Bruce Sterling--bruces@well.sf.ca.us
THE HACKER CRACKDOWN
Law and Disorder on the Electronic Frontier
by Bruce Sterling
CHRONOLOGY OF THE HACKER CRACKDOWN
July. Secret Service covertly videotapes "SummerCon" hacker convention.
September. "Prophet" cracks BellSouth AIMSX computer network and downloads E911 Document to his own computer and to Jolnet.
September. AT&T Corporate Information Security informed of Prophet's action.
October. Bellcore Security informed of Prophet's action.
January. Prophet uploads E911 Document to Knight Lightning.
February 25. Knight Lightning publishes E911 Document in PHRACK electronic newsletter.
May. Chicago Task Force raids and arrests "Kyrie."
June. "NuPrometheus League" distributes Apple Computer proprietary software.
June 13. Florida probation office crossed with phone-sex line in switching-station stunt.
July. "Fry Guy" raided by USSS and Chicago Computer Fraud and Abuse Task Force.
July. Secret Service raids "Prophet," "Leftist," and "Urvile" in Georgia.
January 15. Martin Luther King Day Crash strikes AT&T long-distance network nationwide.
January 18-19. Chicago Task Force raids Knight Lightning in St. Louis.
January 24. USSS and New York State Police raid "Phiber Optik," "Acid Phreak," and "Scorpion" in New York City.
February 1. USSS raids "Terminus" in Maryland.
February 3. Chicago Task Force raids Richard Andrews' home.
February 6. Chicago Task Force raids Richard Andrews' business.
February 6. USSS arrests Terminus, Prophet, Leftist, and Urvile.
Add to tbrJar First Page Next Page